ENCRYPTION METHOD USING PASCAL’S TRIANGLE BASED SUBSTITUTION AND SIERPINSKI TRIANGLE BASED PERMUTATION

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 13

Abstract

Text messages are often created, shared and a person sends at least ten messages a day. Because of its frequent usage those messages are not been encrypted. Thus it is unable to send confidential messages via SMS service. In this paper, we develop a new encryption technique using the notions of Pascals Triangle and Sierpinski Triangle. The proposed method uses the Pascals triangle for substitution and Sierpinski triangle for permutation. The method is simple and easy to implement in real time. It is difficult for the attackers to predict the original message contained in the ciphertext. The proposed method is not much vulnerable to brute force and letter frequency attacks.

Authors and Affiliations

Sivakumar T, Pauvithraa K. T, Durga Devi V

Keywords

Related Articles

Data Security In Cloud Computing: A Review

Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service ove...

Integrated Marker-Based Watershed Segmentation with Hybrid median Filter

This paper focuses on marker based watershed segmentation algorithms. As marker based watershed segmentation algorithm causes over segmentation and cause noise in the image produced. So to reduce these problem different...

Development of An Examination Authentication Embedded System Based on Fingerprint Approach

Security is crucial all around. Access into institutions, examination centers, organizations or even estates ought to be controlled and closely monitored through a verification system. The method of authenticating a stud...

MODEL OF PERCEIVED INFLUENCE OF ACADEMIC PERFORMANCE USING SOCIAL NETWORKING

Social networking sites have created a new social dimension where individuals can increase their social awareness by keeping in touch with old friends, making new friends, getting new data or products and gathering infor...

Cloud Computing Environment: A Review

Cloud computing is a vigorous technology by which a user can get software, application, operating system and hardware as a service without actually possessing it and paying only according to the usage. Cloud Computing is...

Download PDF file
  • EP ID EP650893
  • DOI 10.24297/ijct.v15i13.4806
  • Views 67
  • Downloads 0

How To Cite

Sivakumar T, Pauvithraa K. T, Durga Devi V (2016). ENCRYPTION METHOD USING PASCAL’S TRIANGLE BASED SUBSTITUTION AND SIERPINSKI TRIANGLE BASED PERMUTATION. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 15(13), 7362-7367. https://europub.co.uk./articles/-A-650893